Skip to main content
Top

2021 | OriginalPaper | Chapter

A Survey on Methodologies and Algorithms for Mutual Authentication in IoT Devices

Authors : Rashmi R. Sonth, Y. R. Pranamya, N. Harish Kumar, G. Deepak

Published in: Evolutionary Computing and Mobile Sustainable Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Authentication refers to the process of proving the identity of the IoT device or simply, it is an act of verifying the identity of the system. The scenario where two communicating parties authenticate each other at nearly the same time is called two-way authentication or mutual authentication. Mutual authentication provides trusted communication between remote IoT devices. This paper is aimed at performing a survey on various algorithms used for mutual authentication of IoT devices. The classification has been done based on the parameters used for authentication, its simplicity, optimality, and efficiency of the algorithm. An abstract analysis of the methodologies is illustrated.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Harish Kumar N, Deepak G (2019) Authentication and privacy for IoT objects: a survey. J Emerg Technol Innov Res 6(4):268–271 Harish Kumar N, Deepak G (2019) Authentication and privacy for IoT objects: a survey. J Emerg Technol Innov Res 6(4):268–271
2.
go back to reference Aman MN, Chua KC, Sikdar B (2017) Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet of Things Journal 4(5):1327–1340CrossRef Aman MN, Chua KC, Sikdar B (2017) Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet of Things Journal 4(5):1327–1340CrossRef
3.
go back to reference Li, Q., Cao, G, “Multicast Authentication in Smart Grid with One-Time Signature. IEEE Trans. smart grid,” pp. 686–696, 2011 Li, Q., Cao, G, “Multicast Authentication in Smart Grid with One-Time Signature. IEEE Trans. smart grid,” pp. 686–696, 2011
4.
go back to reference He K, Weng J, Liu J-N, Liu JK, Liu W, Deng RH (2016) Anonymous identity-based broadcast encryption with chose ciphertext security. In: Proceedings of the 11th ACM on Asia conference on computer and communications security—ASIA CCS’16 He K, Weng J, Liu J-N, Liu JK, Liu W, Deng RH (2016) Anonymous identity-based broadcast encryption with chose ciphertext security. In: Proceedings of the 11th ACM on Asia conference on computer and communications security—ASIA CCS’16
5.
go back to reference Mehmood Z, Chen G, Li J, Li L, Alzahrani B (2017) A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. PLoS ONE 12(10):e0186044CrossRef Mehmood Z, Chen G, Li J, Li L, Alzahrani B (2017) A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. PLoS ONE 12(10):e0186044CrossRef
6.
go back to reference Bala DQ, Maity S, Jena SK (2017) Mutual authentication for IoT smart environment using certificate-less public key cryptography. In: 2017 third international conference on sensing, signal processing and security (ICSSS) Bala DQ, Maity S, Jena SK (2017) Mutual authentication for IoT smart environment using certificate-less public key cryptography. In: 2017 third international conference on sensing, signal processing and security (ICSSS)
7.
go back to reference Lyubashevsky V, Masny D (2013) Man-in-the-middle secure authentication schemes from LPN and weak PRFs. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013. Springer, Berlin, pp 308–325 Lyubashevsky V, Masny D (2013) Man-in-the-middle secure authentication schemes from LPN and weak PRFs. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013. Springer, Berlin, pp 308–325
8.
go back to reference Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Inf 14:1656–1665CrossRef Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Inf 14:1656–1665CrossRef
9.
go back to reference Park N, Kim M, Bang HC (2015) Symmetric key-based authentication and the session key agreement scheme in IoT environment. Lecture notes in electrical engineering, pp 379–384 Park N, Kim M, Bang HC (2015) Symmetric key-based authentication and the session key agreement scheme in IoT environment. Lecture notes in electrical engineering, pp 379–384
10.
go back to reference Tewari A, Gupta BB (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102CrossRef Tewari A, Gupta BB (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102CrossRef
11.
go back to reference Jan MA, Khan F, Alam M, Usman M (2017) A payload-based mutual authentication scheme for the Internet of Things. Futur Gener Comput Syst Jan MA, Khan F, Alam M, Usman M (2017) A payload-based mutual authentication scheme for the Internet of Things. Futur Gener Comput Syst
12.
go back to reference Kulseng L, Yu Z, Wei Y, Guan Y (2010) Lightweight Mutual authentication and ownership transfer for RFID systems. In: 2010 proceedings IEEE INFOCOM Kulseng L, Yu Z, Wei Y, Guan Y (2010) Lightweight Mutual authentication and ownership transfer for RFID systems. In: 2010 proceedings IEEE INFOCOM
13.
go back to reference Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for IoT and its applications. IEEE Trans Sustain Comput 2(4):359–370CrossRef Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for IoT and its applications. IEEE Trans Sustain Comput 2(4):359–370CrossRef
14.
go back to reference Chen M, Chen S, Fang Y (2017) Lightweight anonymous authentication protocols for RFID systems. IEEE/ACM Trans Netw 25:1475–1488CrossRef Chen M, Chen S, Fang Y (2017) Lightweight anonymous authentication protocols for RFID systems. IEEE/ACM Trans Netw 25:1475–1488CrossRef
15.
go back to reference Aghili SF, Mala H (2018) Security analysis of Fan et al. lightweight RFID authentication protocol for privacy protection IoT. Cryptology ePrint archive, report 2018/388 Aghili SF, Mala H (2018) Security analysis of Fan et al. lightweight RFID authentication protocol for privacy protection IoT. Cryptology ePrint archive, report 2018/388
16.
go back to reference Chaudhry SA (2015) Comment on ‘robust and efficient password-authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Commun 9(7):1034 Chaudhry SA (2015) Comment on ‘robust and efficient password-authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Commun 9(7):1034
Metadata
Title
A Survey on Methodologies and Algorithms for Mutual Authentication in IoT Devices
Authors
Rashmi R. Sonth
Y. R. Pranamya
N. Harish Kumar
G. Deepak
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5258-8_30